SlideShare a Scribd company logo
1 of 10
MITS Advanced Research Techniques
Research Proposal
Candidate:
Student Name
Higher Education Department
Proposed Title:
Proposed Title of the Research to be Undertaken
Abstract (250 words one page):
The Abstract goes here. The abstract is a brief summary of the
contents of a study, and it allows readers to quickly survey the
essential elements of a project. Approximately 150 - 250 words.
Abstract should be justified, italicized with small margins than
the rest of the document
Introduction(3 pages):
(literature review)(5 pages):
This section provides an opportunity to quickly grab the
attention of your reviewer and explain why they should care
about the project. Contains a number of important sections. The
sections below are recommended, but can be changed to suit
different proposals approx 5pages
Methodological Approach(3 pages):
This section outlines the methods you will use in conducting the
research and analyzing the data. 3 pages
Conclusion :
Half page to one page
If concept matrix is been added than put it before references
References (15 – 20 references):
5 to 8 references are already provided just add a few more in it
Running head: CYBER SECURITY 1
CYBER SECURITY 2
Topic : Cyber Security
Cyber Security
Abstract
Data integrity, an integral aspect of cyber security, is identified
as the consistence and accuracy that is assured of data in its life
cycle, and is an imperative aspect of implementation, design,
and utilization of systems which processes, stores, and retrieves
data (Graham, 2017). It is estimated that almost 90 percent of
the world’s data was generated in the last two year, and this
goes to show the rate at which data is being availed. There are
various threats associated with data integrity, for example,
security, human, and transfer errors, cyber-attacks and malware
just to name a few. The purpose of examination of data integrity
in the context of organizations and business is due to the impact
that it has on the latter’s operations and eventual success.
Data integrity is important when it comes to the productivity
and operations of an organization, because management make
decisions based on real-time data that is offered to them. If the
data presented to management is inaccurate due to lack of
proper data integrity, then the decisions that they make might
have an adverse effect on an organization. For example, if data
related to last year’s projections and profits in the finance
department is altered in any way, then the decision of making
plans in relation to an organization’s financial position might be
lead to further losses. Organizations ought to prioritize security
measures through there various Information Systems
departments or by seeking third party cyber security specialties
to protect and mitigate against the threats related to data
integrity.
Research Question
What are the threats associated with data integrity and the
impact they have on organizational productivity and operations?
Reference
Graham, Kenneth R. (2017). Data Integrity
Solution
s: Turning Data into Dollars & Sense. Bookbaby.
Article
Human Error
Transfer Error
Cyber Attacks
Compromised Hardware
Malware
Belkacem & Bouhamdi (2018)
X
X
X
Nedal & Sail (2013)
X
X
X
X
Morovat (2015)
X
X
X
X
Patel et al. (2015)
X
X
X
Kavale. (2012)
X
X
X
X
Rodríguez & American Society for Quality (2019).
X
X
X
X
Kim, & SecTech (2010)
X
X
X
X
Citations of Selected Articles
Article 1
Article 2
Article 3
Article 4
Article 5
Belkacem, A., & .Bouhamdi, A. (2018). “Model for decision-
making process with big data,” Journal of Theoretical and
Applied Information Technology, vol. 96, p. 5951 – 596
Nedal, A., & Sail, A., (2013). “Data integrity in cloud
computing security,” Journal of Theoretical and Applied
Information Technology, Vol. 58, no. 3, p. 570.
Morovat, K. (2015). Data Integrity Verification in Cloud
Computing.
Patel, N., Shah, P., & Prajapati, P. (2015). Efficient Data
Recovery with Data Integrity Proetection. Saarbrucken: LAP
LAMBERT Academic Publishing.
Kavale, S. (2012). “The role of data in strategic decision
making process,” International journal of current research, vol.
4, no. 4, p. 01-07.
Rodríguez, P. J., & American Society for Quality,. (2019). Data
integrity and compliance: A primer for medical product
manufacturers.
Kim, T., & SecTech. (2010). Security Technology, Disaster
Recovery and Business Continuity: International Conferences,
SecTech and DRBC 2010, Held as Part of the Future Generation
Information Technology Conference, FGIT 2010, Jeju Island,
Korea, December 13-15, 2010. Proceedings.
Reason for choosing this source
This article is a good source due to its availability and good
authors.
This source touches on the main topic and gives an in depth
analysis of data integrity.
This source is simplified and gives proper insight on data
integrity.
This source not only focuses on the causes of loss of data but
also the means of repairing loss.
This source gives the reason for data breaches and the best way
to rid of them.
This article shows the importance of compliance in achieving
data integrity.
This article focuses on security, disaster recovery and business
continuity in terms of breach.
Brief Description of the source.
This source looks at big data and how it can be easily managed.
It recognizes the susceptibility of big data to many breaches and
the focal points for cyber-attacks.
This source beliefs that cloud computing is the best way to store
data. It therefore focuses on how cloud computing can be made
safe and secure from breaches.
This source focuses on verification of data integrity in cloud
computing. It looks to find the sources of breaches and how
they get into the system even in secure scenarios.
This source looks to cover all grounds from protection, breach
and recovery. It tackles all the problems and tries to find the
link between all the processes.
This source looks at how strategically handling data and the
potential threats to data integrity can save a company from any
breach.
The source looks at the legal side of breaches. Companies may
have to pay fines if their data integrity is compromised and
should look to compliance to help them.
This article is on the security from the potential sources of
breaches. It also shows how business continuity can be
achieved.
Data Integrity attacks
· Managing big data
· Protection from breaches in big data.
· Transfer error
· Cyber Attacks
· Compromised Hardware
· Malware
· Storage of data in cloud
· Human error
· Cyber Attacks
· Compromised hardware
· Malware
· Transfer Error
· Human Error
· Compromised Hardware
· Data Recovery
· Human error
· Cyber Attacks
· Compromised hardware
· Malware
· Malware
· Human Error
· Compromised Hardware
· Data Recovery
· Transfer Error
· Malware
· Compromised Hardware
· Data Recovery

More Related Content

Similar to MITS Advanced Research TechniquesResearch ProposalCandidate.docx

Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Anastasija Nikiforova
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...TEWMAGAZINE
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docxSONU61709
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxSourabhkumar729579
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxtodd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxhealdkathaleen
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxhealdkathaleen
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data scienceJohnson Ubah
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 
Streamlining the Future: Exploring Data Flow Architecture
Streamlining the Future: Exploring Data Flow ArchitectureStreamlining the Future: Exploring Data Flow Architecture
Streamlining the Future: Exploring Data Flow ArchitectureStarTech21
 
Data lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageData lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageDr. C.V. Suresh Babu
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
 
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxRunning head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxtodd271
 
Discussion 1Knowledge-centric organizations have incorporated mo
Discussion 1Knowledge-centric organizations have incorporated moDiscussion 1Knowledge-centric organizations have incorporated mo
Discussion 1Knowledge-centric organizations have incorporated moVinaOconner450
 

Similar to MITS Advanced Research TechniquesResearch ProposalCandidate.docx (20)

Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docx
 
data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Big data
Big dataBig data
Big data
 
Streamlining the Future: Exploring Data Flow Architecture
Streamlining the Future: Exploring Data Flow ArchitectureStreamlining the Future: Exploring Data Flow Architecture
Streamlining the Future: Exploring Data Flow Architecture
 
Data lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageData lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storage
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxRunning head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
 
Discussion 1Knowledge-centric organizations have incorporated mo
Discussion 1Knowledge-centric organizations have incorporated moDiscussion 1Knowledge-centric organizations have incorporated mo
Discussion 1Knowledge-centric organizations have incorporated mo
 

More from roushhsiu

Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxroushhsiu
 
Morgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxMorgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxroushhsiu
 
Mortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxMortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxroushhsiu
 
Moreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxMoreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxroushhsiu
 
Most people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxMost people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxroushhsiu
 
Moral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxMoral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxroushhsiu
 
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxMontasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxroushhsiu
 
Module Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxModule Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxroushhsiu
 
Molière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxMolière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxroushhsiu
 
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxModule One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxroushhsiu
 
Monitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxMonitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxroushhsiu
 
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
Monitoring Global Supply Chains†   Jodi L. Short Prof.docxMonitoring Global Supply Chains†   Jodi L. Short Prof.docx
Monitoring Global Supply Chains† Jodi L. Short Prof.docxroushhsiu
 
Morality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxMorality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxroushhsiu
 
Module 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxModule 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxroushhsiu
 
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxModule Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxroushhsiu
 
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxModule Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxroushhsiu
 
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docxMONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docxroushhsiu
 
MODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxMODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxroushhsiu
 
Most organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxMost organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxroushhsiu
 
More like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxMore like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxroushhsiu
 

More from roushhsiu (20)

Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docx
 
Morgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docxMorgan and Dunn JD have hired you to assist with a case involvin.docx
Morgan and Dunn JD have hired you to assist with a case involvin.docx
 
Mortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docxMortality rates vary between the Hispanic community and the gene.docx
Mortality rates vary between the Hispanic community and the gene.docx
 
Moreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docxMoreno Industries has adopted the following production budget for th.docx
Moreno Industries has adopted the following production budget for th.docx
 
Most people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docxMost people have a blend of leadership styles that they use. Some le.docx
Most people have a blend of leadership styles that they use. Some le.docx
 
Moral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docxMoral rights as opposed to legal rights are not dependent on a polit.docx
Moral rights as opposed to legal rights are not dependent on a polit.docx
 
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docxMontasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forens.docx
 
Module Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docxModule Outcome  You will be able to describe the historical force.docx
Module Outcome  You will be able to describe the historical force.docx
 
Molière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docxMolière believed that the duty of comedy is to correct human vices b.docx
Molière believed that the duty of comedy is to correct human vices b.docx
 
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docxModule One Making Budgetary DecisionsDirectionsBased on the i.docx
Module One Making Budgetary DecisionsDirectionsBased on the i.docx
 
Monitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docxMonitoring Data and Quality ImprovementAnswer one of two que.docx
Monitoring Data and Quality ImprovementAnswer one of two que.docx
 
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
Monitoring Global Supply Chains†   Jodi L. Short Prof.docxMonitoring Global Supply Chains†   Jodi L. Short Prof.docx
Monitoring Global Supply Chains† Jodi L. Short Prof.docx
 
Morality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docxMorality Relativism & the Concerns it RaisesI want to g.docx
Morality Relativism & the Concerns it RaisesI want to g.docx
 
Module 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docxModule 9 content You will perform a history of a cardiac pro.docx
Module 9 content You will perform a history of a cardiac pro.docx
 
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docxModule Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
Module Assessment 4 TANM ApplicationsBUS2 190Last name, Fir.docx
 
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docxModule Assignment Clinical Decision Support SystemsLearning Outcome.docx
Module Assignment Clinical Decision Support SystemsLearning Outcome.docx
 
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docxMONTCLAIR UNIVERSITYLAWS 362  LEGAL WRITING   MIDTERM.docx
MONTCLAIR UNIVERSITYLAWS 362 LEGAL WRITING MIDTERM.docx
 
MODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docxMODULE 8You will perform a history of a respiratory problem th.docx
MODULE 8You will perform a history of a respiratory problem th.docx
 
Most organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docxMost organizations, including hospitals, adopt both Mission and Visi.docx
Most organizations, including hospitals, adopt both Mission and Visi.docx
 
More like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docxMore like this Abstract TranslateFull Text Translate.docx
More like this Abstract TranslateFull Text Translate.docx
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

MITS Advanced Research TechniquesResearch ProposalCandidate.docx

  • 1. MITS Advanced Research Techniques Research Proposal Candidate: Student Name Higher Education Department Proposed Title: Proposed Title of the Research to be Undertaken Abstract (250 words one page): The Abstract goes here. The abstract is a brief summary of the contents of a study, and it allows readers to quickly survey the essential elements of a project. Approximately 150 - 250 words. Abstract should be justified, italicized with small margins than the rest of the document Introduction(3 pages): (literature review)(5 pages): This section provides an opportunity to quickly grab the attention of your reviewer and explain why they should care about the project. Contains a number of important sections. The sections below are recommended, but can be changed to suit different proposals approx 5pages Methodological Approach(3 pages): This section outlines the methods you will use in conducting the research and analyzing the data. 3 pages Conclusion : Half page to one page If concept matrix is been added than put it before references References (15 – 20 references): 5 to 8 references are already provided just add a few more in it
  • 2. Running head: CYBER SECURITY 1 CYBER SECURITY 2 Topic : Cyber Security Cyber Security Abstract Data integrity, an integral aspect of cyber security, is identified as the consistence and accuracy that is assured of data in its life cycle, and is an imperative aspect of implementation, design, and utilization of systems which processes, stores, and retrieves data (Graham, 2017). It is estimated that almost 90 percent of the world’s data was generated in the last two year, and this goes to show the rate at which data is being availed. There are various threats associated with data integrity, for example, security, human, and transfer errors, cyber-attacks and malware just to name a few. The purpose of examination of data integrity in the context of organizations and business is due to the impact that it has on the latter’s operations and eventual success. Data integrity is important when it comes to the productivity and operations of an organization, because management make decisions based on real-time data that is offered to them. If the data presented to management is inaccurate due to lack of proper data integrity, then the decisions that they make might have an adverse effect on an organization. For example, if data related to last year’s projections and profits in the finance department is altered in any way, then the decision of making
  • 3. plans in relation to an organization’s financial position might be lead to further losses. Organizations ought to prioritize security measures through there various Information Systems departments or by seeking third party cyber security specialties to protect and mitigate against the threats related to data integrity. Research Question What are the threats associated with data integrity and the impact they have on organizational productivity and operations? Reference Graham, Kenneth R. (2017). Data Integrity Solution s: Turning Data into Dollars & Sense. Bookbaby. Article Human Error Transfer Error Cyber Attacks Compromised Hardware Malware Belkacem & Bouhamdi (2018) X X X
  • 4. Nedal & Sail (2013) X X X X Morovat (2015) X X X X Patel et al. (2015) X X X Kavale. (2012) X X X X
  • 5. Rodríguez & American Society for Quality (2019). X X X X Kim, & SecTech (2010) X X X X Citations of Selected Articles Article 1 Article 2 Article 3 Article 4 Article 5
  • 6. Belkacem, A., & .Bouhamdi, A. (2018). “Model for decision- making process with big data,” Journal of Theoretical and Applied Information Technology, vol. 96, p. 5951 – 596 Nedal, A., & Sail, A., (2013). “Data integrity in cloud computing security,” Journal of Theoretical and Applied Information Technology, Vol. 58, no. 3, p. 570. Morovat, K. (2015). Data Integrity Verification in Cloud Computing. Patel, N., Shah, P., & Prajapati, P. (2015). Efficient Data Recovery with Data Integrity Proetection. Saarbrucken: LAP LAMBERT Academic Publishing. Kavale, S. (2012). “The role of data in strategic decision making process,” International journal of current research, vol. 4, no. 4, p. 01-07. Rodríguez, P. J., & American Society for Quality,. (2019). Data integrity and compliance: A primer for medical product manufacturers. Kim, T., & SecTech. (2010). Security Technology, Disaster
  • 7. Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Reason for choosing this source This article is a good source due to its availability and good authors. This source touches on the main topic and gives an in depth analysis of data integrity. This source is simplified and gives proper insight on data integrity. This source not only focuses on the causes of loss of data but also the means of repairing loss. This source gives the reason for data breaches and the best way to rid of them. This article shows the importance of compliance in achieving data integrity. This article focuses on security, disaster recovery and business continuity in terms of breach. Brief Description of the source. This source looks at big data and how it can be easily managed.
  • 8. It recognizes the susceptibility of big data to many breaches and the focal points for cyber-attacks. This source beliefs that cloud computing is the best way to store data. It therefore focuses on how cloud computing can be made safe and secure from breaches. This source focuses on verification of data integrity in cloud computing. It looks to find the sources of breaches and how they get into the system even in secure scenarios. This source looks to cover all grounds from protection, breach and recovery. It tackles all the problems and tries to find the link between all the processes. This source looks at how strategically handling data and the potential threats to data integrity can save a company from any breach. The source looks at the legal side of breaches. Companies may have to pay fines if their data integrity is compromised and should look to compliance to help them. This article is on the security from the potential sources of breaches. It also shows how business continuity can be achieved. Data Integrity attacks · Managing big data · Protection from breaches in big data.
  • 9. · Transfer error · Cyber Attacks · Compromised Hardware · Malware · Storage of data in cloud · Human error · Cyber Attacks · Compromised hardware · Malware · Transfer Error · Human Error · Compromised Hardware · Data Recovery · Human error · Cyber Attacks · Compromised hardware · Malware · Malware · Human Error · Compromised Hardware · Data Recovery · Transfer Error · Malware · Compromised Hardware